Cooperation Stimulation and Security in Wireless Ad Hoc Networks — A Power-Efficient Bayesian Game Approach
暂无分享,去创建一个
[1] Mainak Chatterjee,et al. Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.
[2] Jie Wu,et al. Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[3] Madasamy Kaliappan,et al. Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model , 2015, Comput. Electr. Eng..
[4] Sushanta Karmakar,et al. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .
[5] Afrand Agah,et al. A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks , 2013, Int. J. Netw. Secur..
[6] Yoav Shoham,et al. Essentials of Game Theory: A Concise Multidisciplinary Introduction , 2008, Essentials of Game Theory: A Concise Multidisciplinary Introduction.
[7] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[8] K. J. Ray Liu,et al. Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[9] Leonardo Badia,et al. Using game theory and Bayesian networks to optimize cooperation in ad hoc wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[10] Chase Qishi Wu,et al. On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks , 2010, SpringSim.
[11] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[12] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[13] Yang Li,et al. MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.